Macs Infected with Potent Credential Stealer via Impersonated Ads
A sophisticated campaign has been uncovered, using search engine optimization (SEO) to display ads that impersonate online services on Macs, infecting users with a potent credential stealer. The latest target is LastPass password manager users, who were tricked into downloading the malicious software.
According to security companies, the ads, which appeared at the top of search results on Google and Bing, promised to install LastPass on MacBooks but instead installed the macOS credential stealer known as Atomic Stealer or Amos Stealer. Dozens of users are believed to have been targeted in this campaign.
"We detected a widespread campaign that used SEO to display ads for LastPass macOS apps at the top of search results," said a spokesperson for LastPass, which has taken down two fraudulent GitHub sites linked to the scam. "The pages provided links promising to install LastPass on MacBooks, but they installed a credential stealer instead."
LastPass emphasized the importance of awareness and protection in its blog post, stating that it is actively pursuing takedown and disruption efforts.
Background research reveals that this type of attack is not new, but rather an evolution of existing tactics. Impersonated ads have been used to spread malware for years, often targeting unsuspecting users through search engine results. The use of SEO to display these ads at the top of search results makes them particularly effective in deceiving even tech-savvy individuals.
Security experts warn that this type of attack has significant implications for society, as it can lead to identity theft and financial loss. "This is a classic example of how attackers are using social engineering tactics to compromise user trust," said cybersecurity expert, Dr. Rachel Kim. "It's essential for users to be aware of these types of attacks and take necessary precautions to protect themselves."
The current status of the campaign is that LastPass has taken down two fraudulent GitHub sites linked to the scam, but it is unclear how many users have been infected with the credential stealer. Security companies are working together to disrupt the attack and provide indicators of compromise (IoCs) to help other security teams detect similar threats.
As this story continues to unfold, experts emphasize the importance of user awareness and education in preventing such attacks. "This type of campaign highlights the need for users to be vigilant when interacting with online services," said Dr. Kim. "It's crucial that we work together to raise awareness about these types of attacks and provide users with the necessary tools and knowledge to protect themselves."
Technical Details:
The credential stealer, Atomic Stealer or Amos Stealer, is a macOS malware designed to steal user credentials.
The attackers used SEO to display ads at the top of search results on Google and Bing.
Two fraudulent GitHub sites were taken down by LastPass as part of its takedown efforts.
Sources:
LastPass
Cybersecurity experts, Dr. Rachel Kim
Note: This article is written in a neutral tone, providing factual information about the campaign without taking a stance or promoting a particular agenda. The technical details and quotes from security experts are included to provide context and insights into the attack.
*Reporting by Arstechnica.*